Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Security threats of smart contract management      
 7     Security framework of smart contract management
 8     Security requirements for smart contract management        
        8.1     Security requirements in the design and development phase 
        8.2     Security requirements in the compilation and deployment phase         
        8.3     Security requirements in the invocation and execution phase 
        8.4     Security requirements in the maintenance and management phase    
Appendix I – Smart contract weakness classification    
Bibliography